The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Use of digital token — which certifies the bearer's rights to some kind of products or services — is quite common nowadays for its convenience, ease of use and cost-effectiveness. Many of such digital tokens, however, are produced with software alone, making them vulnerable to forgery, including alteration and duplication. For a more secure safeguard for both token owner's right and service provider's...
A comprehensive access control system must provide a well-designed mechanism for delegation of access-control rights. In order to achieve a balance between security and flexibility, delegation of access privileges is necessary in one way or another for any kind of enterprise; for healthcare systems in particular, the ability to delegate access privileges is crucially important as it can directly impact...
With widespread adoption of digitalization, the healthcare industry is more prone to cyber attacks than ever before. For thwarting data breaches, a robust access control system plays a vital role by only granting authorized access requests. An ideal healthcare access control system should also have the provision for delegation management which enables a patient — in certain conditions — to delegate...
Protecting electronic health records (EHR) from unauthorized access and data breaches has been a great challenge for healthcare organizations in recent times. Controlling access to EHR demands a delicate balance between security and flexibility: There are emergency cases where the default access control policy must be circumvented in order to save patients' life — and cases where management of access...
Protecting electronic health records (EHR) from unauthorized access and data breaches has been a great challenge for healthcare organizations in recent times. Controlling access to EHR demands a delicate balance between security and flexibility: There are emergency cases where the default access control policy must be circumvented in order to save patients' life — and cases where management of access...
This article posits tamper-resistance as a necessary security measure for cyber-physical systems (CPS). With omnipresent connectivity and pervasive use of mobile devices, software security alone is arguably not sufficient to safeguard sensitive digital information we use everyday. As a result, utilization of a variety of tamper-resistant devices -- including smartcards, secure digital cards with integrated...
The idea of smart building has become closer to reality due to the recent advances in ubiquitous computing technologies. However, it still remains an open question how a computational system can optimize user comfort levels in buildings, which is crucial because it affects the quality of life and work of all occupants. Since multiple users share building spaces and they have hierarchical relationship...
Adopting IT as an integral part of business and operation is certainly making the healthcare industry more efficient and cost-effective. With the widespread digitalization of personal health information, coupled with big data revolution and advanced analytics, security and privacy related to medical data — especially ensuring authorized access thereto — is facing a huge challenge. In this paper, we...
This paper presents eTRON as a comprehensive architecture for securer and smarter smartcard application development. At the core of the eTRON architecture lies the tamper-resistant eTRON chip which is equipped with functions for mutual authentication, encrypted communication and strong access control. The IC chip supports dual-interface in a single card that is compliant with ISO/IEC 7816 and ISO/IEC...
Ensuring adequate security and privacy of health information is a moral and legal mandate of the twenty-first-century healthcare industry that is fast moving towards complete digitalization. As a consequence of increased threats to security of electronic health records, a genuine need for a robust and effective authentication and access control schemes has emerged. Since healthcare systems pose some...
Healthcare information systems collect, store and manage sensitive information about patients and, hence, it is imperative for such systems to provide robust access control mechanisms with a view to thwarting potential security and privacy threats. The access-control requirements in healthcare systems are quite diverse as compared to those of other systems. The existing subject-, role-, object-, attribute-,...
Although current electronic commerce (e-commerce) technology plays an important role in today's economy, it is still not full-fledged for the lack of enough security and flexibility. We propose eTNet, a smart card network architecture for electronic transactions, which fills up the gap and further extends our previous work, the eTRON architecture. The eTNet framework is made up of an overlay network...
This work proposes a Secure User Centric Attestation Service (SUCAS) protocol that incorporates user's action information with spatial-temporal information rendered from the location-based service to create action-spatial-temporal evidence. This evidence can be used as proof to protect the owner's right in times of need. The SUCAS protocol preserves user's privacy by granting control to the user while...
Many e-commerce applications are prevalent in today's world. New features and enhanced security, both are required for successful launch and deployment of e-commerce applications. In this paper, we focus on a generic e-commerce architecture, called eTRON which incorporates - at its nucleus - the tamper-resistant eTRON chip, equipped with functions for mutual authentication, secure communication, and...
In ubiquitous computing environment the miniature devices have to perform computations with resource limitation in terms of limited processing capability, limited memory and limited supply of energy. This computational resource limitation poses a great challenge for realizing the true benefits of ubiquitous computing. In this paper, we have categorically examined the state-of-the-art solutions to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.